NORDSEC B.V. logo

NORDSEC B.V.

21 Marks
LLC
First Filed:Oct 3, 2016Latest Filed:Jan 10, 2025Address:Fred. Roeskestraat 115, Amsterdam, NL-1076 EE, NL

Portfolio Overview

Registered
14(67%)
Pending
7(33%)

Top Classes

Class 42
Software, IT Services & Scientific Research
20(95%)
Class 9
Electronics, Software & Scientific Equipment
20(95%)
Class 38
Telecommunications
15(71%)

TTAB Proceedings

Total Proceedings
5
As Plaintiff
5(100%)
As Defendant
0(0%)

Top Firms

Gray Ice Higdon, PLLC(Dec 2024)
18

Trademark Activity Timeline(2016 – 2025)

Trademark Portfolio

21 results

(current & previous marks)

Refine by Mark/Description🔽
Filed
Registered
Last Activity
79427134
79427134
Trademark
Design
PENDING
Owner:
Serial:79427134
Filed:Jan 10, 2025
Classes:9, 35, 36, +2
Goods & Services
Downloadable computer software for identity theft and fraud protection; downloadable computer software for detecting identity fraud; downloadable computer software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, social media account takeovers, phone number takeovers, bank account takeovers, new account openings, large account balance changes, credit utilization, dormant accounts, address changes, home title records scanning, and court records scanning; downloadable privacy control software, namely, software for use in protecting online identity, privacy and data; downloadable computer software for tracking and managing personal and private identity data; downloadable application software that enables users to monitor for identity theft and track their credit scores; downloadable application software that enables users to respond to identity theft and credit fraud alerts; downloadable computer antivirus software; downloadable computer software for providing network, internet, and computer security; downloadable content filtering software; downloadable computer software for encrypting and authenticating data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for use in anonymous browsing, antitracking protection, network protection, and privacy protection; digital security software, digital privacy protection software and data masking, anonymization and obfuscation software; downloadable computer maintenance software, namely, software that identifies and removes unwanted programs.; Providing credit reporting data maintained by others; credit reporting services; credit risk management services; credit risk management services, namely, obtaining credit information and other public and personal financial information for use in providing reports on credit risks due to identity theft; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; providing identity theft insurance underwritten by others; providing reimbursement of costs associated with identity theft; credit card theft protection, namely, consultation in the field of credit reporting services in the nature of providing assistance with setting fraud alerts and security freezes at credit reporting agencies; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation.; Providing consumer information concerning fraud and identity theft protection services for assisting others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft; data management services; data management services for use in removing individuals' names and personal information from third-party websites, online public records databases, and data brokers; customer care services in the nature of customer relationship management in the event of identity theft and data loss.; Legal and investigation services on fraud and identity theft in the nature of providing personal legal assistance and advice to others concerning personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and traveler checks in the event of loss or theft; legal services and assistance, and investigation services related to identity theft; consultancy in the field of data theft and identity theft; identity verification services, namely, providing authentication of personal identification information; investigation services related to insurance claims.; Identity theft protection services; identity theft and fraud prevention services, namely, electronic monitoring of personal and financial information; providing non-downloadable software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, gaming account credential theft, investment account activity, social media account takeovers, phone number takeovers, home title records scanning, and court records scanning; electronic monitoring of credit card activity, credit reports and personally identifying information to detect fraud or identity theft via the internet; computer services, namely, data recovery services; electronic monitoring of computer networks for security purposes for protecting data; software as a service (SaaS) featuring software for storing and retrieving login credentials securely and generating strong passwords; software as a service (SaaS) services featuring software for securely backing up and archiving electronic data; analyzing technical data in computer databases for criminal activity; software as a service (SaaS) featuring software for use in cybersecurity intelligence and protection, namely, software for the detection and mitigation of computer viruses, malware, network anomalies and security breaches; software as a service (SaaS) featuring software for use in monitoring, searching, and analyzing the dark web for criminal activity; software as a service (SaaS) featuring software for removing personal information from public and private websites and databases; providing non-downloadable software for use in providing network, internet, and computer security; providing non-downloadable software for use in anonymous browsing, encryption, antitracking protection, network protection, privacy protection, and data leakage prevention; data security threat analysis, namely, monitoring public reports concerning larger scale data security breaches for fraud protection purposes; providing information on protecting data from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft; providing consultation and information in the field of identity theft protection featuring methods and techniques to safeguard personal identifying information; cybersecurity services, namely, internet security consultation; electronic monitoring of credit card activity to detect fraud via the internet; electronic monitoring of personally identifying information to detect identity theft via the internet; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems for security purposes.
79427133
79427133
Trademark
Design
PENDING
Owner:
Serial:79427133
Filed:Jan 10, 2025
Classes:9, 42, 45
Goods & Services
Downloadable computer software for gathering, storage, manipulation, management and encryption of data related to security breaches and incidents; downloadable computer software for the management of security breaches, incidents, and responses to them; downloadable computer software for searching the internet for possible disclosure of personal or private information and alerting users about potential breaches; downloadable computer software for dark-web scanning and monitoring; downloadable computer software for use in the fields of cybersecurity, computer forensics, diagnostic, security breaches and incidents; downloadable computer software for providing network, internet, and computer security; internet security software, namely, downloadable computer software for monitoring and controlling computer and online activity; downloadable computer software for tracking and managing personal and other data entered on websites; computer software platforms for locating, assessing, measuring and remediating suspected malware; downloadable computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for providing anti-virus protection, and for the detection of internet threats, espionage and attacks; downloadable computer software for detecting computer system vulnerabilities; downloadable privacy and security software, namely, software for use in protecting online identity, data and information; digital security software, digital privacy protection software and data masking, anonymization and obfuscation software; downloadable computer software for use in anonymous browsing, encryption, antitracking protection, network protection, and privacy protection; downloadable computer software for enhancing and managing web browser software.; Domain name management services; legal services relating to domain recovery, including monitoring domain name registration and ownership changes, and providing legal assistance in recovering domain names; legal services for the intellectual property rights and copyright protection by means of social media and digital platforms monitoring to eliminate domain squatting, typo phishing campaigns, spearfishing, spoofed accounts, data leakage targeted attacks, account takeovers, threats of violence, and compliance issues; monitoring and management of intellectual property rights for legal advisory purposes in the nature of monitoring the internet for use, misuse, and unauthorized use, sharing or disclosure of brand names, trademarks, domain names, other business identifiers, email addresses and other business data; intellectual property protection services, namely, Internet surveillance and monitoring to detect possible infringement, domain name abuse and cybersquatting, and remediation services.; Software as a service (SaaS) services featuring software for use in cybersecurity, namely, software for detecting, reporting, and responding to malicious attacks, intrusions and other security breaches on computer systems and networks; hosting a website for temporary use of non-downloadable computer software for the detection of internet threats, espionage and attacks; software as a service (SaaS) featuring software for use in scanning networks, websites and applications to detect and identify vulnerabilities and malware; computer services, namely, detection of computer viruses and other computer security threats; software as a service (SaaS) services featuring software for use in cybersecurity intelligence and protection, namely, software for the detection and mitigation of computer viruses, malware, network anomalies and security breaches; providing non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware; providing security threat management systems for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; software as a service (SaaS) services featuring software for providing network, internet, and computer security; software as a service (SaaS) services featuring software for use in monitoring, searching, and analyzing the dark web for criminal activity; hosting a website featuring technology enabling users to monitor surface and deep (dark) web for user-related identifiable information; monitoring social media, digital platforms and internet (including dark web) to detect and eliminate domain squatting, typo phishing campaigns, spearfishing, spoofed accounts, data leakage targeted attacks, account takeovers, threats of violence, and compliance issues; data security threat analysis, namely, monitoring public reports concerning larger scale data security breaches for fraud protection purposes; software as a service (SaaS) services featuring software for analyzing data in the field of breached, leaked, and stolen personally identifiable and other information; computer security threat analysis for protecting data; software as a service (SaaS) services featuring software for managing information security risks; monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring software for removing personal information from public and private websites and databases; providing non-downloadable software for use in anonymous browsing, encryption, antitracking protection, network protection, privacy protection, data compression, and data leakage prevention; software as a service (SaaS) services featuring software for assessing, analyzing and organizing data to generate a predictive risk score to assist in the prevention of fraud; software as a service (SaaS) services, namely, hosting software for use by others for understanding malicious uniform resource locators (urls) and the enterprise digital attack surface, receiving active change notifications, investigating threats, identifying adversaries and preventing digital attacks; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; design and development of electronic data security systems; software as a service (SaaS) services featuring software for cybersecurity purposes; providing information in the field of computer network and internet information security; computer security consultancy; providing temporary use of non-downloadable software for use in searching, sorting, monitoring and viewing online content for specific keywords; application service provider (ASP) featuring computer search engine software; development of information catalogs on the basis of web sites for third parties being database development services; providing computer and information technology security services through the cloud; providing online non-downloadable software for monitoring threats, identifying vulnerabilities, managing brand reputation, and monitoring for fraudulent behavior, all on computer networks in the field of cybersecurity; software as a service (SaaS) services featuring temporary use of non-downloadable cybersecurity software for use on social media and digital platforms and providing alerts identifying malicious or dangerous content; computer consulting services in the field of application development, code review, computer security, and software architecture analysis; computer consulting services in connection with conducting software audits and implementing best practices in the identification, tracking, and management of software assets and the use of third party software; development of fraud prevention, fraud detection, compliance, client verification or business verification computer software solutions; technological services relating to domain name recovery, in particular, tracking changes in domain registration and ownership and providing IT support for the recovery of lost or compromised domain names.
NORDPROTECT
NORDPROTECT
Trademark
Word
PENDING
Owner:
Serial:79417134
Filed:Dec 6, 2024
Classes:9, 35, 36, +2
Goods & Services
Downloadable computer software for identity theft and fraud protection; downloadable computer software for detecting identity fraud; downloadable computer software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, social media account takeovers, phone number takeovers, bank account takeovers, new account openings, large account balance changes, credit utilization, dormant accounts, address changes, home title records scanning, and court records scanning; downloadable privacy control software, namely, software for use in protecting online identity, privacy and data; downloadable computer software for tracking and managing personal and private identity data; downloadable application software that enables users to monitor for identity theft and track their credit scores; downloadable application software that enables users to respond to identity theft and credit fraud alerts; downloadable computer antivirus software; downloadable computer software for providing network, internet, and computer security; downloadable content filtering software; downloadable computer software for encrypting and authenticating data; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for use in anonymous browsing, antitracking protection, network protection, and privacy protection; digital security software, digital privacy protection software and data masking, anonymization and obfuscation software; downloadable computer maintenance software, namely, software that identifies and removes unwanted programs.; Providing credit reporting data maintained by others; credit reporting services; credit risk management services; credit risk management services, namely, obtaining credit information and other public and personal financial information for use in providing reports on credit risks due to identity theft; credit risk management and consultation services, namely, assistance with restoring and analyzing credit damaged by identity theft; providing identity theft insurance underwritten by others; providing reimbursement of costs associated with identity theft; credit card theft protection, namely, consultation in the field of credit reporting services in the nature of providing assistance with setting fraud alerts and security freezes at credit reporting agencies; fraud and identity theft protection services consisting of credit card and debit card cancellation services in the event of loss or theft, namely, registering credit and debit cards for cancellation.; Providing consumer information concerning fraud and identity theft protection services for assisting others with replacing personal identification cards, driver’s licenses, social security cards, insurance cards, checkbooks and travelers checks in the event of loss or theft; data management services; data management services for use in removing individuals’ names and personal information from third-party websites, online public records databases, and data brokers; customer care services in the nature of customer relationship management in the event of identity theft and data loss.; Recovery and resolution of identity theft; consultancy in the field of data theft and identity theft; identity verification services, namely, providing authentication of personal identification information; investigation services related to insurance claims.; Identity theft protection services; electronic monitoring of financial transactions and activities to detect suspicious, fraudulent transactions and activities: providing non-downloadable software that provides alerts and notifications to users regarding potential identity theft, fictitious identity monitoring, credit fraud, dark web activity, gaming account credential theft, investment account activity, social media account takeovers, phone number takeovers, home title records scanning, and court records scanning; electronic monitoring of credit card activity, credit reports and personally identifying information to detect fraud or identity theft via the internet; computer services, namely, data recovery services; electronic monitoring of computer networks for security purposes for protecting data; software as a service (SaaS) featuring software for storing and retrieving login credentials securely and generating strong passwords; software as a service (SaaS) services featuring software for securely backing up and archiving electronic data; analyzing technical data in computer databases for criminal activity; software as a service (SaaS) featuring software for use in cybersecurity intelligence and protection, namely, software for the detection and mitigation of computer viruses, malware, network anomalies and security breaches; software as a service (SaaS) featuring software for use in monitoring, searching, and analyzing the dark web for criminal activity; software as a service (SaaS) featuring software for removing personal information from public and private websites and databases; providing non-downloadable software for use in providing network, internet, and computer security; providing non-downloadable software for use in anonymous browsing, encryption, antitracking protection, network protection, privacy protection, and data leakage prevention; data security threat analysis, namely, monitoring public reports concerning larger scale data security breaches for fraud protection purposes; providing information on protecting data from unauthorized use, namely, information on protection related to consumer credit, fraud and identity theft; providing consultation and information in the field of identity theft protection featuring methods and techniques to safeguard personal identifying information; cybersecurity services, namely, internet security consultation; electronic monitoring of credit card activity to detect fraud via the internet; electronic monitoring of personally identifying information to detect identity theft via the internet; monitoring of computer systems for detecting unauthorized access or data breach; monitoring of computer systems for security purposes. Fraud and identity theft protection services, namely, providing personal assistance to others with replacing personal identification cards, driver's licenses, social security cards, insurance cards, checkbooks and traveler checks in the event of loss or theft;.
NORDSTELLAR
NORDSTELLAR
Trademark
Word
PENDING
Owner:
Serial:79420720
Filed:Dec 6, 2024
Classes:9, 42, 45
Goods & Services
Downloadable computer software for gathering, storage, manipulation, management and encryption of data related to security breaches and incidents; downloadable computer software for the management of security breaches, incidents, and responses to them; downloadable computer software for searching the internet for possible disclosure of personal or private information and alerting users about potential breaches; downloadable computer software for dark-web scanning and monitoring; downloadable computer software for use in the fields of cybersecurity, computer forensics, diagnostic, security breaches and incidents; downloadable computer software for providing network, internet, and computer security; internet security software, namely, downloadable computer software for monitoring and controlling computer and online activity; downloadable computer software for tracking and managing personal and other data entered on websites; computer software platforms for locating, assessing, measuring and remediating suspected malware; downloadable computer software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware, and other malware; downloadable computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable computer software for providing anti-virus protection, and for the detection of internet threats, espionage and attacks; downloadable computer software for detecting computer system vulnerabilities; downloadable privacy and security software, namely, software for use in protecting online identity, data and information; digital security software, digital privacy protection software and data masking, anonymization and obfuscation software; downloadable computer software for use in anonymous browsing, encryption, antitracking protection, network protection, and privacy protection; downloadable computer software for enhancing and managing web browser software.; Domain name monitoring and recovery services, namely tracking changes in domain registration and ownership for brand protection and support in recovering lost or compromised domain names; intellectual property protection services, namely internet surveillance and monitoring to detect possible infringement, domain name abuse and cybersquatting and remediation services.; Software as a service (SaaS) featuring software for use in cybersecurity, namely, software for detecting, reporting, and responding to malicious attacks, intrusions and other security breaches on computer systems and networks; hositing websites for temporary use of non-downloadable computer software for the detection of internet threats, espionage and attacks; providing security threat management services for protecting data, namely, monitoring and tracking of security vulnerabilities and problems in computer software products, the internet, and computer networks; software as a service (SaaS) featuring software for use in scanning networks, websites and applications to detect and identify vulnerabilities and malware; computer services, namely detection of computer viruses and other computer security threats; software as a service (SaaS) featuring software for use in cybersecurity intelligence and protection, namely software for the detection and mitigation of computer viruses, malware, network anomalies and security breaches; providing non-downloadable software for inspecting electronic files to detect and prevent computer security attacks, phishing, computer and email viruses, spam, spyware, adware and malware; software as a service (SaaS) featuring software for providing network, internet, and computer security; software as a service (SaaS) featuring software for use in monitoring, searching, and analyzing the dark web for criminal activity; hosting websites featuring technology enabling users to monitor surface and deep (dark) web for user-related identifiable information; monitoring social media, digital platforms and internet (including dark web) to detect and eliminate domain squatting, typo phishing campaigns, spearfishing, spoofed accounts, data leakage targeted attacks, account takeovers, threats of violence, and compliance issues; data security threat analysis, namely, monitoring public reports concerning larger scale data security breaches for fraud protection purposes; computer security threat analysis for protecting data; software as a service (SaaS) featuring software for analyzing data in the field of breached, leaked and stolen personally identifiable and other information; monitoring of computer systems for detecting unauthorized access or data breach; software as a service (SaaS) featuring software for managing information security risks; software as a service (SaaS) featuring software for removing personal information from public and private websites and databases; providing non-downloadable software for use in anonymous browsing, encryption, antitracking protection, network protection, privacy protection, data compression and data leakage prevention; software as a service (SaaS) featuring software for assessing, analyzing and organizing data to generate a predictive risk score to assist in the prevention of fraud; software as a service (SaaS) featuring hosting software for use by others for understanding malicious uniform resource locators (Urls) and the enterprise digital attack surface, receiving active change notifications, investigating threats, identifying adversaries and preventing digital attacks; design and development of electronic data security systems; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; software as a service (SaaS) featuring software for cybersecurity purposes; computer security consultancy; providing information in the field of computer network and internet information security; providing non-downloadable software for use in searching, sorting, monitoring and viewing online content for specific keywords; application service provider (ASP) services featuring computer search engine software; development of databases containing information catalogs on the basis of web sites for third parties; providing computer and information technology security services through the cloud; providing online non-downloadable software for monitoring threats, identifying vulnerabilities, managing brand reputation, and monitoring for fraudulent behavior, all on computer networks in the field of cybersecurity; software as a service (SaaS) featuring temporary use of non-downloadable cybersecurity software for use on social media and digital platforms and providing alerts identifying malicious or dangerous content; computer consulting services in the field of application development, code review, computer security and software architecture analysis; computer consulting services in connection with conducting software audits and implementing best practices in the identification, tracking, and management of software assets and the use of third party software; development of fraud prevention, fraud detection, compliance, client verification or business verification computer software; social media and digital platforms content monitoring to eliminate domain squatting, typo phishing campaigns, spearfishing, spoofed accounts, data leakage targeted attacks, account takeovers, threats of violence and compliance issuesbrand and business reputation and security [threats] monitoring services, namely, monitoring the internet for use, misuse, and unauthorized use, sharing or disclosure of brand names, trademarks, domain names, other business identifiers, email addresses and other business data.
SAILY
SAILY
Trademark
Combined
PENDING
Owner:
Serial:79408394
Filed:Jul 11, 2024
Classes:9, 35, 38, +1
Goods & Services
Application software; computer programmes for use in telecommunications; computer programs, downloadable; computer software; computer software for mobile phones; mobile software; mobile software for use in telecommunications; software and applications for mobile devices; downloadable mobile applications for the transmission of data; application software for mobile devices; computer software for use in providing multiple user access to a global computer information network; telecommunications software; sim cards; computer telephony software; software for smartphones; internet access software; computer programs for accessing and using the internet; computer software for use as an application programming interface (API).; Providing third party users with access to telecommunication infrastructure; telecommunication services; communications by computer and providing access to the internet; provision of access to data on communication networks; communications services provided over the internet; international data transmission; internet access services; internet based telecommunication services; internet connection services for residential consumers and for commercial entities; providing access to computer networks; providing access to the internet and other communications networks; providing telecommunications connections to the internet; provision of access to computer networks and the internet; mobile communications services; telecommunications services between computer networks; consultancy in the field of telecommunications; data transmission services over telecommunications networks; information and advisory services relating to telecommunication services; providing access to telecommunication networks; international telephone services; provision of access to telecommunication services and mobile data via eSIM cards; telephone services, in relation to the following goods: international data plans for travelers (roaming).; Arranging subscriptions to internet services; arranging subscriptions to telecommunication services for others; arranging of contracts for the purchase and sale of goods and services, for others.; Rental and maintenance of computer software; rental of software for internet access; software as a service [SaaS]; design, development and programming of computer software; technical support services relating to computer software and applications; rental of computer software relating to travel.
SAILY
SAILY
Trademark
Word
PENDING
Owner:
Serial:79412680
Filed:Jun 12, 2024
Classes:9, 35, 38, +1
Goods & Services
Application software; computer programmes for use in telecommunications; computer programs, downloadable; computer software; computer software for mobile phones; mobile software; mobile software for use in telecommunications; software and applications for mobile devices; downloadable mobile applications for the transmission of data; application software for mobile devices; computer software for use in providing multiple user access to a global computer information network; telecommunications software; SIM cards; computer telephony software; software for smartphones; Internet access software; computer programs for accessing and using the Internet; computer software for use as an application programming interface (API).; Providing third party users with access to telecommunication infrastructure; telecommunication services; communications by computer and providing access to the Internet; provision of access to data on communication networks; communications services provided over the internet; international data transmission; internet access services; internet based telecommunication services; internet connection services for residential consumers and for commercial entities; providing access to computer networks; providing access to the internet and other communications networks; providing telecommunications connections to the internet; provision of access to computer networks and the internet; mobile communications services; telecommunications services between computer networks; consultancy in the field of telecommunications; data transmission services over telecommunications networks; information and advisory services relating to telecommunication services; providing access to telecommunication networks; international telephone services; provision of access to telecommunication services and mobile data via eSIM cards; telephone services, in relation to the following goods: international data plans for travelers (roaming).; Arranging subscriptions to internet services; arranging subscriptions to telecommunication services for others; arranging of contracts for the purchase and sale of goods and services, for others.; Rental and maintenance of computer software; rental of software for internet access; software as a service [SaaS]; design, development and programming of computer software; technical support services relating to computer software and applications; rental of computer software relating to travel.
NORDLABS
NORDLABS
Trademark
Word
REGISTERED
Owner:
Serial:79381947
Filed:Aug 31, 2023
Classes:9, 38, 42, +1
Registration:7683046
Registered:Feb 11, 2025
Goods & Services
Scientific, research, [ navigation, surveying, ] * navigational, geodetic, * photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, [ switching ] * distributing *, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for managing passwords, passkeys, and other personal information; downloadable and recorded computer software for routing Internet traffic; downloadable and recorded computer software for setting up and managing virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded decoder software; downloadable and recorded anti-ad * vertising * computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded middleware for application software integration; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing Internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network services; computer network server; computer networks in the nature of computer networking hardware; computer networks in the nature of computer networking software; downloadable and recorded computer software for biometric systems * used * for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for [ privacy violation detection and for informing and protecting a user's privacy ] * detecting breaches of privacy and for informing and protecting the privacy of users * ; downloadable and recorded computer software for [ web content filtering ] * filtering web content * ; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for managing passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing Internet traffic and setting up virtual networks; downloadable and recorded computer software [ which facilitates ] * to facilitate * data compression; downloadable and recorded computer software [ which ] * that * facilitates the routing of communications and data; downloadable and recorded [ cryptography ] * encryption * software; downloadable and recorded data communications software to access data stored on a server and transfer data to another device; data networks being computer network devices, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges; downloadable and recorded data processing software; downloadable computer software for [ enabling ] * to enable * virtual private network (VPN) operation on computers; downloadable computer software for encrypting [ any kind ] * all types * of electronic data for transmission [ through a secure and private connection over the Internet ] * over a secure, private Internet connection * ; downloadable computer software [ for providing ] * to provide users with * secure [ and ] private * Internet * access [ for users to the Internet ] ; downloadable computer software [ that enables ] * enabling * users of computers and mobile computing devices to * connect * securely [ connect ] to a remote server [ in order ] to [ allow for ] * enable software for * secure and private transmission of communications over the Internet; downloadable and recorded encryption [ software ] ; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for managing passwords, passkeys, and other personal information; downloadable and recorded * network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded * software for operating * VPN (virtual private network) [ operating software ] ; VPN (virtual private network) hardware; downloadable and recorded * electronic messaging * remote access * software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; [ electronic mail ] * email * servers being computer services; [ downloadable and recorded software for ensuring the security of electronic mail ] * email security of downloadable and recorded software * ; computer hardware for [ remotely accessing ] * and [ transmitting ] data * transmission * ; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for [ managing ] encryption and password [ s ] * management * ; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for [ automating ] * the automation of * a process for * the * authentication of [ identity ] * identities * using existing databases in connection with the [ issuance ] * issue * and management of digital certificates used for * the * authentication or encryption of digital communications [ , ] or * for the * authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable * the * secure transmission of digital information, namely, confidential, financial and credit card information over the [ Internet, as well as over ] * Internet and * other [ modes ] * means * of communication between [ computing ] * computer * devices; downloadable and recorded computer software [ to integrate ] * for the integration of * managed security services, namely, public key infrastructure (PKI) services, [ digital certificate issuance, ] verification, management and [ enterprise ] * software, services and * issuance of digital certificates and integration of business * software [ integration, ] with existing * software, services and * communications networks, [ software and services ] ; downloadable and recorded computer software for use in [ analysis and reporting of ] * analyzing and presenting * firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for [ encrypting and authenticating ] data * encryption and authentification * ; downloadable and recorded computer software for encryption; downloadable and recorded computer software * used * for [ use in the encryption and decryption of ] * encrypting and decrypting * digital files, including audio, video, [ text, ] binary, [ still images, ] graphics and multimedia files * , as well as text and still image files * ; downloadable and recorded computer software for identity security; downloadable and recorded computer software for * the security of * authentication and identity management information [ security ] ; downloadable and recorded computer software for * enabling access to * digital * data and * information [ and data access ] ; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for [ use in ] networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for [ use in ] * electronic * vulnerability scanning of networks and websites; downloadable and recorded artificial intelligence software for analysis in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable and recorded artificial intelligence and machine learning software being downloadable and recorded computer software using artificial intelligence for software development; downloadable and recorded computer software platforms for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software platforms for file storing and file sharing; downloadable and recorded computer software platforms for managing passwords, passkeys and other personal information; downloadable and recorded computer software platforms for routing Internet traffic; downloadable and recorded computer software platforms for setting up and managing virtual networks; downloadable and recorded computer software platforms for testing new software products; downloadable and recorded interactive computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded interactive computer software for file storing and file sharing; downloadable and recorded interactive computer software for managing passwords, passkeys and other personal information; downloadable and recorded interactive computer software for routing Internet traffic; downloadable and recorded interactive computer software for setting up and managing virtual networks; downloadable and recorded plugin software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded plugin software for file storing and file sharing; downloadable and recorded plugin software for managing passwords, passkeys and other personal information; downloadable and recorded information retrieval software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded information retrieval software for managing passwords, passkeys and other personal information; downloadable and recorded software for processing images, graphics, audio, * sequences, * video * sequences * and text in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable and recorded software for processing images, graphics, audio, * sequences, * video * sequences * and text in the field of artificial intelligence; downloadable and recorded virtual assistant software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded virtual assistant software for managing passwords, passkeys and other personal information; downloadable and recorded virtual assistant software for file storing and file sharing; downloadable and recorded computer [ application software for use in ] * software applications to be used for * implementing the internet of things [IOT] being downloadable and recorded software for connecting, operating, and managing networked servers, routers, switches, hubs, adapters, bridges, computers, mobile devices, wireless devices * ; none of the aforementioned products relate to digital music, music extension software, digital libraries containing sounds or instrument extracts, or to the production or creation of music *; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; Scientific and technological services [ and ] * as well as * research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy data security services in the nature of managing passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; * Services provided by consultants relating to * computer software [ consulting ] ; computer software design * services * ; computer software development; computer software maintenance; * Rental of *computer software [ rental; computer software ] ; technical support services, * with respect to computer software * namely, troubleshooting of computer software problems; configuration of computer networks [ by ] * using * software being computer network configuration services; consultancy services [ relating ] * in relation * to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services [ relating ] * related * to the development of computer networks; monitoring of network systems, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; programming of operating software for accessing and using a cloud computing network; providing information [ about ] * with respect to * the design and development of computer hardware and software; [ providing ] * provision of * virtual [ computer ] * computing * environments [ through ] * via * cloud computing; providing virtual computer systems [ through ] * via * cloud computing; rental of computer software; software as a service (SaaS) [ featuring ] * offering * anti-ad *vertising * software; software as a service (SaaS) [ featuring ] * offering * anti-malware software; software as a service (SaaS) [ featuring ] * offering * anti-spam software; software as a service (SaaS) [ featuring ] * offering * anti-spyware software; software as a service (SaaS) [ featuring ] * offering * anti-tracking software; software as a service (SaaS) [ featuring ] * offering * privacy [ violation ] * breach * detection software; software as a service (SaaS) [ featuring ] * offering * web content filtering software; software as a service (SaaS) for [ providing ] data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access for their proper functioning; monitoring of computer systems by remote access for their security; providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in e-commerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation; Artificial intelligence technology consultancy; Research in the field of artificial intelligence; Technology consultation in the field of artificial intelligence
79332633
79332633
Trademark
Design
REGISTERED
Owner:
Serial:79332633
Filed:Sep 30, 2021
Classes:9, 38, 42, +1
Registration:7458941
Registered:Jul 30, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
NORDVPN
NORDVPN
Trademark
Word
REGISTERED
Owner:
Serial:79332636
Filed:Sep 30, 2021
Classes:9, 38, 42, +1
Registration:7458942
Registered:Jul 30, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
79333362
79333362
Trademark
Design
REGISTERED
Owner:
Serial:79333362
Filed:Sep 29, 2021
Classes:9, 38, 42, +1
Registration:7458945
Registered:Jul 30, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
NORD
NORD
Trademark
Word
REGISTERED
Owner:
Serial:79332631
Filed:Sep 29, 2021
Classes:9, 38, 42, +1
Registration:7458940
Registered:Jul 30, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
NORDLAYER
NORDLAYER
Trademark
Word
REGISTERED
Owner:
Serial:79335362
Filed:Sep 29, 2021
Classes:9, 38, 42, +1
Registration:7458950
Registered:Jul 30, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
NORDLOCKER
NORDLOCKER
Trademark
Word
REGISTERED
Owner:
Serial:79332629
Filed:Sep 29, 2021
Classes:9, 38, 42, +1
Registration:7458938
Registered:Jul 30, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
NORDPASS
NORDPASS
Trademark
Word
REGISTERED
Owner:
Serial:79332630
Filed:Sep 29, 2021
Classes:9, 38, 42, +1
Registration:7458939
Registered:Jul 30, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
NORDSEC
NORDSEC
Trademark
Word
REGISTERED
Owner:
Serial:79332634
Filed:Sep 29, 2021
Classes:9, 38, 42, +1
Registration:7451804
Registered:Jul 23, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
NORD SECURITY
NORD SECURITY
Trademark
Word
REGISTERED
Owner:
Serial:79332635
Filed:Sep 29, 2021
Classes:9, 38, 42, +1
Registration:7451805
Registered:Jul 23, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadable computer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; "SECURITY"; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
NORD SECURITY
NORD SECURITY
Trademark
Combined
REGISTERED
Owner:
Serial:79332632
Filed:Sep 29, 2021
Classes:9, 38, 42, +1
Registration:7451803
Registered:Jul 23, 2024
Goods & Services
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, Hologram apparatus, Photocopying apparatus, Telephone apparatus, Video transmission apparatus, Audio switching apparatus, Sound transmitting apparatus, Film reproducing apparatus, Sound reproducing apparatus, Data processing apparatus, Wireless telephony apparatus, Encoding and decoding apparatus and instruments, Digital telephone switching apparatus, Remote control telemetering apparatus, Apparatus for transmission of communication, Global positioning system (GPS) apparatus, Record playing apparatus and instruments, Antennas for wireless communications apparatus, Surveying machines and instruments, Weighing apparatus and instruments, Electronic navigational and positioning apparatus and instruments, Video recorders and video reproducing apparatus, Remote control telemetering machines and apparatus, Apparatus for recording, transmission, processing and reproduction of sound, images or data, Electronic apparatus and instruments for controlling, adjusting and testing of drives and motors, Cable broadcast transmission machines and apparatus, Open-wire transmission machines and apparatus; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity; apparatus and instruments for recording, transmitting, reproducing or processing sound, images or data; recorded and downloadable media, namely, pre-recorded DVDs, downloadable audio and video recordings, and CDs featuring and promoting privacy and security; downloadable and recorded computer software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software for file storing and file sharing; downloadable and recorded computer software for management of passwords, passkeys and other personal information; downloadable and recorded computer software for routing internet traffic; downloadable and recorded computer software for set up and management of virtual networks; blank digital or analogue recording and storage media; computers and computer peripheral devices; computer hardware; downloadable and recorded anti-ad computer software; downloadable and recorded anti-malware computer software; downloadable and recorded anti-spam computer software; downloadable and recorded anti-tracking computer software; downloadable and recorded antispyware software; downloadable and recorded application software for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded application software for file storing and file sharing; downloadable and recorded application software for management of passwords, passkeys, other personal information; downloadable and recorded application software for authentication; downloadable and recorded application software for routing internet traffic and setting up virtual networks; downloadable authentication software for identifying and authenticating users to ensure privacy and security online; downloadable authentication software for identifying and authenticating users in password protected environments; downloadable authentication software for identifying and authenticating users for protected network access; downloadable cloud computing software for ensuring privacy and security online; downloadable cloud computing software for ensuring privacy and security of file storing and file sharing; downloadable cloud computing software for ensuring privacy and security of virtual networks; downloadable cloud computing software for ensuring privacy and security of computer networks; downloadable and recorded cloud computing software for file storing and file sharing; downloadable and recorded cloud computing software for setting up virtual networks and routing internet traffic; downloadable and recorded security software for ensuring cybersecurity, digital security, information security, network security and online privacy; cloud servers being network servers; computer network server; computer networks in the nature of computer networking hardware and recorded operating system software; downloadable and recorded computer software for biometric systems for the identification and authentication of persons; downloadable and recorded computer software for controlling and managing access server applications; downloadable and recorded computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable and recorded computer software for web content filtering; downloadable and recorded computer software packages for ensuring cybersecurity, digital security, information security, network security and privacy; downloadable and recorded computer software packages for file storing and file sharing; downloadable and recorded computer software packages for management of passwords, passkeys, other personal information; downloadable and recorded computer software packages for encryption and authentication; downloadable and recorded computer software packages for routing internet traffic and setting up virtual networks; downloadable and recorded computer software which facilitates data compression; downloadable and recorded computer software which facilitates the routing of communications and data; downloadable and recorded cryptography software; downloadable and recorded data communications software to access data stored on and transfer data to another device; Data networks being computer network devices, computer network instruments, computer network apparatus, computer network servers, computer network routers, computer network switches, computer network hubs, computer network adapters, computer network bridges, and computer network servers; downloadable and recorded data processing software; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; downloadable and recorded encryption software; local area networks being computer networking hardware and downloadablecomputer software for setting up local area networks; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for ensuring privacy and security online; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for secure file storing and sharing; mobile software in the nature of downloadable computer application software for mobile phones, namely, software for management of password and passkeys; downloadable and recorded network access server operating software; downloadable and recorded network management software; downloadable and recorded proxy server software; downloadable and recorded VPN (virtual private network) operating software; VPN (virtual private network) hardware; downloadable and recorded software for transmitting emails securely; electronic mail terminals in the nature of computer terminals; electronic mail servers being computer servers; downloadable and recorded software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus in the nature of electronic encryption units; hardware and downloadable and recorded software for managing encryption and passwords; downloadable and recorded computer software for database management in the field of cryptographic network security, website security and data security; downloadable and recorded computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; downloadable and recorded computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; downloadable and recorded computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; downloadable and recorded computer software for use in analysis and reporting of firewall log data; downloadable and recorded computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; downloadable and recorded computer software for encrypting and authenticating data; downloadable and recorded computer software for encryption; downloadable and recorded computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable and recorded computer software for identity security; downloadable and recorded computer software for authentication and identity management information security; downloadable and recorded computer software for digital information and data access; downloadable and recorded computer software and firmware for the management, transmission, and storage of data and information; downloadable and recorded computer software for use in networking computers; downloadable and recorded computer software for use in monitoring computers and websites for security purposes; downloadable and recorded computer software for use in accessing databases; downloadable and recorded computer software for use in vulnerability scanning of networks and websites; Telecommunications gateway services; Digital network telecommunications services; Telecommunications services for providing multiple-user access to a global computer network; Telecommunication services, namely, transmission of voice, data, graphics, images, audio and video by means of telecommunications networks, wireless communication networks, and the Internet; email forwarding services; transmission of electronic mail; electronic mail and mailbox services being transmission of electronic mail; data transmission by electronic mail; data communication by electronic mail; providing electronic transmission of secure e-mail and data; communication via virtual private networks; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications; network services for enabling virtual private network (VPN) operation; transmission of encrypted communications; providing users with secure remote access via the internet to private computer networks; providing virtual private network (VPN) services; remote data access services; provision of access to data or documents stored electronically in central files for remote consultation; Licensing of databases in the nature of licensing of computer software; software licensing; "SECURITY"; Scientific and technological services and research and design relating thereto, namely, scientific research, analysis, testing, and design in the field of privacy and security; design and development of computer hardware and software; data security services in the nature of data encryption services for ensuring cybersecurity, digital security, information security, network security and online privacy; data security services in the nature of management of passwords, passkeys, and other personal information; cloud computing, namely, cloud hosting provider services; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting servers for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring cybersecurity for use by others; cloud computing services, namely, infrastructure as a service (IAAS) services, namely, hosting software for ensuring network security for use by others; computer network configuration services; computer network services being computer network security services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services, namely, troubleshooting of computer software problems; configuration of computer networks by software being computer network configuration services; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems, namely, monitoring technological functions of computer network systems; monitoring of network systems, namely, monitoring security of computer network systems; monitoring of network systems, namely, detecting vulnerabilities within computer network systems; Programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) featuring software for providing traffic routing of data; software as a service (SaaS) featuring software for ensuring privacy and security; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access to ensure proper functioning; monitoring of computer systems by remote access to ensure their security; Providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting, namely, hosting computer software applications of others; Scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing temporary use of on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; Software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid in the nature of computer software development, use and implementation consultation
NORD
NORD
Trademark
Word
ITU
PENDING
Owner:
Serial:88768969
Filed:Jan 22, 2020
Classes:9, 38, 42
Goods & Services
Downloadable anti-ad computer software for telecommunications, data encryption and internet security; downloadable anti- malware computer software for telecommunications, data encryption and internet security; downloadable anti-spam computer software for telecommunications, data encryption and internet security; downloadable anti-tracking computer software for telecommunications, data encryption and internet security; downloadable Antispyware software for telecommunications, data encryption and internet security; downloadable Application software for telecommunications, data encryption and internet security; downloadable Authentication software for telecommunications, data encryption and internet security; Downloadable cloud computing software for telecommunications, data encryption and internet security; Computer network server; downloadable computer software for telecommunications, data encryption and internet security; downloadable computer software for biometric systems for the identification and authentication of persons; downloadable computer software for controlling and managing access server applications; downloadable computer software for privacy violation detection and for informing and protecting a user's privacy; downloadable computer software for web content filtering; Computer software packages comprised of data encryption, VPN (virtual private network), and internet security software; downloadable computer software which facilitates data compression; downloadable computer software which facilitates the routing of communications and data; downloadable Cryptography software; downloadable Data communications software for telecommunications, data encryption and internet security; Data networks, namely, private data networks for transmitting and receiving secured and encrypted data; Downloadable Data processing software; Downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet; downloadable computer software for providing secure and private access for users to the Internet; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet; Downloadable Encryption software for internet security; Local area networks, namely, for transmitting and receiving secured and encrypted data; Downloadable Mobile software for telecommunications, data encryption and internet security; downloadable network access server operating software; Downloadable Network management software; Downloadable Security software for data encryption and internet security; Downloadable VPN (virtual private network) operating software; VPN (virtual private network) hardware; Downloadable Email software for data encryption and internet security; Electronic mail terminals; Downloadable Software for data encryption and internet security used in ensuring the security of electronic mail; Data transmission by electronic mail; Data communication by electronic mail; Providing electronic transmission of secure e-mail; Communication via virtual private networks; network service for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications, namely, for providing secure access to global computer network or the internet; Network service for enabling virtual private network (VPN) operation, namely, ensuring and supporting virtual private network (VPN) services; electronic Transmission of encrypted communications; Providing users with secure remote access via the internet to private computer networks; Providing virtual private network (VPN) services; Cloud computing featuring software for use telecommunications, data encryption and internet security; Cloud computing services featuring software for use telecommunications, data encryption and internet security; Computer network configuration services; Computer network services, namely, for data encryption, data security, telecommunications, and Virtual Private Network (VPN); computer programming; Computer software consulting; Computer software design; Computer software development; Computer software maintenance; computer software rental; computer software technical support services, namely, in the fields of data encryption, data security, and Virtual Private Network (VPN); Configuration of computer networks by software; Consultancy services relating to computer network design; Consulting services in the field of cloud computing; Creation, maintenance and adaptation of software; data encryption services; Encryption, decryption and authentication of information, messages and data; Information services relating to the development of computer networks; Monitoring of network systems; Programming of operating software for accessing and using a cloud computing network for others; Providing information about the design and development of computer hardware and software; Providing virtual computer environments through cloud computing; Providing virtual computer systems through cloud computing; Rental of computer software; Software as a service (Saas) featuring anti-ad software for data encryption, data security, telecommunications, and Virtual Private Network (VPN); software as a service (Saas) featuring anti- malware software for data encryption, data security, telecommunications, and Virtual Private Network (VPN); software as a service (Saas) featuring anti-spam software for data encryption, data security, telecommunications, and Virtual Private Network (VPN); software as a service (Saas) featuring anti-spyware software for data encryption, data security, telecommunications, and Virtual Private Network (VPN); software as a service (Saas) featuring anti-tracking software for data encryption, data security, telecommunications, and Virtual Private Network (VPN); software as a service (Saas) featuring privacy violation detection software; software as a service (Saas) featuring web content filtering software; software as a service (Saas) for providing data compression software; software as a service (Saas) for providing traffic routing of data; Software as a service featuring software for data encryption, data security, telecommunications, and Virtual Private Network (VPN); Software creation; Software engineering; technological advisory services relating to computer programs; Electronic storage of archived e-mails; Updating of computer software
NORDLOCKER
NORDLOCKER
Trademark
Word
REGISTERED
Owner:
Serial:79277242
Filed:Nov 26, 2019
Classes:9, 42
Registration:6564617
Registered:Nov 23, 2021
Goods & Services
Downloadable computer software packages comprised of encryption tools for securely storing and sharing data and digital files; Downloadable cloud computing software for securely storing and sharing data and digital files; downloadable encryption software; Downloadable computer software for securely encrypting, storing and sharing data and digital files; downloadable application software for securely encrypting information and files used in cloud computing services; downloadable computer software for encryption; Computer software design; cloud computing services featuring software for use in securely storing and sharing of data and files; software as a service [SaaS] featuring software for encrypting data and files; computer software technical support services, namely, for encryption; rental of computer software; design, development and programming of computer software; cloud computing featuring software for use in the field of encryption; design and development of operating software for cloud computing networks; providing virtual computer environments through cloud computing; data encryption services; programming of operating software for accessing and using a cloud computing network; software design; encryption, decryption and authentication of information, messages and data; software creation; design, development and implementation of software; software engineering; consulting services in the field of cloud computing; providing virtual computer systems through cloud computing; updating of computer software; creation, maintenance and adaptation of software
NORDPASS
NORDPASS
Trademark
Word
REGISTERED
Owner:
Serial:79274501
Filed:Nov 4, 2019
Classes:9, 42
Registration:6541520
Registered:Nov 2, 2021
Goods & Services
Downloadable data communications software for securely sharing of personal identity information and digital files; Downloadable utility, security and cryptography software for securely storing and managing personal identity information and digital files; Downloadable authentication software for securely sharing personal identity information and files with verified users; Downloadable security software for securely sharing personal identity information and digital files; Downloadable computer software for biometric systems for the identification and authentication of persons; Downloadable encryption software for protecting personal identity information and digital files; Downloadable data processing software; Downloadable mobile application software for enhancing and managing web browser software and protecting personal identity information; Downloadable computer software for enhancing and managing web browser software and protecting personal identity information; Downloadable application software for securely sharing encrypted personal identity information and digital files; Downloadable cryptography software for securely backing up the passwords, personal identity information and digital files; Data encryption services; software as a service [SaaS] featuring software for enhancing and managing web browser software and protecting personal identity information; computer software development; encryption, decryption and authentication of information, messages and data; providing information about the design and development of computer hardware and software; computer software maintenance; computer software consulting
NORDVPN
NORDVPN
Service Mark
Word
REGISTERED
Owner:
Serial:87190896
Filed:Oct 3, 2016
Classes:38
Registration:5299477
Registered:Oct 3, 2017
Goods & Services
Providing virtual private network (VPN) services

Cookie Preferences

We use cookies (including Google Analytics) to improve our site and understand how visitors use it.